A FunctionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: A Function returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Application Security
 •   Business Process Management (BPM)
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Network Security
 •   Data Security
 •   Endpoint Security
 •   Mobile Device Management

Related Searches
 •   A Function Cost
 •   A Function Improve
 •   A Function Purchase
 •   A Function Video
 •   A Function Webcasts
 •   Canadian A Function
 •   Distribution A
 •   Portals A Function
 •   Proposal A
 •   Regional A Function
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Convergence: 4 paths to efficient data centers by Dell, Inc. and Intel®

November 17, 2013 - (Free Research)
This resource details how converged infrastructures offer four essential data center efficiencies needed to streamline maintenance and management of existing systems, while shifting focus to more valuable-added IT services. 
(RESOURCE) READ ABSTRACT |

A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.

June 29, 2011 - (Free Research)
This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing. 
(WHITE PAPER) READ ABSTRACT |

How Security is Changing to Support Virtualization and Cloud Computing by Trend Micro, Inc.

February 17, 2011 - (Free Research)
In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data. 
(WHITE PAPER) READ ABSTRACT |

Energy Impact of Increased Server Inlet Temperature by APC by Schneider Electric

July 09, 2009 - (Free Research)
The quest for efficiency improvement raises questions regarding the optimal air temperature for data centers. The goal is to find the optimal temperature range where the combined IT and cooling load is minimized. Data presented is based upon actual sealed testing of different cooling systems when subjected to the simulated composite server... 
(WHITE PAPER) READ ABSTRACT |

Maximizing UPS Availability by Eaton Corporation

January 27, 2011 - (Free Research)
This white paper examines how organizations optimize UPS availability. It also explains why modular UPS designs provide superior availability even though they typically contain more parts that could potentially fail. 
(WHITE PAPER) READ ABSTRACT |

Energy Impact of Increased Server Inlet Temperature by Schneider Electric

October 06, 2011 - (Free Research)
This white paper tests a commonly held idea about the optimal temperature of data center for a variety of infrastructure. 
(WHITE PAPER) READ ABSTRACT |

The Rising Impact of Virtualization on Data Backup and Recovery by Acronis

February 20, 2012 - (Free Research)
This white paper highlights the rise of virtualization and explores what businesses today can do in terms of adjusting backup and recovery functions to maintain a functioning virtual data center. Learn what applications are most commonly virtualized today, discover the differences in backup between small and large organizations and more. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 23, 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

Mobile Configuration Management Functions for Successful MDM by SearchSecurity.com

July 02, 2013 - (Free Research)
Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management. 
(EGUIDE) READ ABSTRACT |

Spotlight on IT - Sustained Growth through Operational Excellence by SAP America, Inc.

July 1967 - (Free Research)
This paper-one of four function-specific papers-is based on the IT responses and follow-up interviews with technology executives who participated in the 2008 Economist Intelligence Unit operational excellence survey sponsored by SAP. 
(WHITE PAPER) READ ABSTRACT |

Forming an Agile IT Function by Hewlett-Packard Company

November 2013 - (Free Research)
This brief resource explores the important considerations that CIOs need to keep in mind when taking steps to bring in agility into IT function. Learn how to form a roadmap to IT success by reading on now. 
(WHITE PAPER) READ ABSTRACT |

Process Automation for the Twenty-Ten Decade: The Automation of Business Technology by Network Automation, Inc

October 2010 - (Free Research)
This paper discusses the need for business process automation and how it can make your company vastly more efficient. Continue reading to learn how to stay ahead of the curve on process automation during the twenty-ten decade. 
(WHITE PAPER) READ ABSTRACT |

Choosing an MDM System: Fundamental Features for Success by SearchSecurity.com

February 2013 - (Free Research)
There's a huge number of mobile device management (MDM) functions that exist today. Read this expert E-Guide to get a condensed list of the major MDM system features that most organizations require. 
(EGUIDE) READ ABSTRACT |

The OSI Model: Understanding the Seven Layers of Computer Networks by Global Knowledge

July 2006 - (Free Research)
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking. 
(WHITE PAPER) READ ABSTRACT |

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

How to Turn Excel into an Advanced BI Solution by Symtrax Corporation

June 2012 - (Free Research)
In this informative resource, you'll learn how to easily use Excel to extract data from your database in a way that facilitates further analysis and uses standard Excel functions. Discover the 12 functions your database must support in order to turn Excel into an advanced BI tool. 
(WHITE PAPER) READ ABSTRACT |

Service Portfolio Management: Manage IT For Business Value by CA Technologies.

October 2009 - (Free Research)
Read this paper to learn how Service Portfolio Management can be implemented to achieve and show evidence of improved business satisfaction, reduced waste, reduced cost, and enhanced service quality. IT can better select strategic investments and maximize business value. 
(WHITE PAPER) READ ABSTRACT |

Software-Defined Networking: Top Architecture and Security Considerations by SearchSecurity.com

June 2013 - (Free Research)
This e-guide examines the potential of network functions virtualization (NFV) in revolutionizing how networks are built, managed and used to create services as well as reveals the dark side of software-defined networking. 
(EGUIDE) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Rapid Deployment Solutions: Features, Functions, Apps by itelligence, Inc.

November 2013 - (Free Research)
In this expert resource, explore the drivers, use cases, and benefits of Rapid Deployment Solutions, as well as the features and functions of these tools. Discover if a Rapid Deployment Solution is right for your next application deployment by reading now. 
(WHITE PAPER) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

MDM Software: Benefits of Mobile Configuration Management by SearchSecurity.com

November 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution. 
(EGUIDE) READ ABSTRACT |

IT Modernization: An Exercise In Alignment by Hewlett Packard Company and Intel

June 2009 - (Free Research)
A survey conducted in February 2009 by the Economist Intelligence Unit, sponsored by Oracle and HP, shows in most companies the business functions and the IT function understand the benefits of modernization. But that does not mean that most companies know how to do it right. Read this white paper for practical advice on achieving modernization. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts